Sie sind auf Seite 1von 9

DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent

Variable Evolution∗

Philip Bontrager Aditi Roy Julian Togelius


New York University Tandon New York University Tandon New York University Tandon
philipjb@nyu.edu ar3824@nyu.edu julian@togelius.com
arXiv:1705.07386v4 [cs.CV] 18 Oct 2018

Nasir Memon Arun Ross


New York University Tandon Michigan State University
memon@nyu.edu rossarun@cse.msu.edu

Abstract user’s fingerprint. Since small portions of a fingerprint are


not as distinctive as the full fingerprint, the chances of a par-
Recent research has demonstrated the vulnerability of tial fingerprint (from one finger) being incorrectly matched
fingerprint recognition systems to dictionary attacks based with another partial fingerprint (from a different finger) are
on MasterPrints. MasterPrints are real or synthetic finger- higher. This observation was exploited by Roy et al. [25],
prints that can fortuitously match with a large number of who introduced the notion of MasterPrints. MasterPrints
fingerprints thereby undermining the security afforded by are a set of real or synthetic fingerprints that can fortuitously
fingerprint systems. Previous work by Roy et al. generated match with a large number of other fingerprints. Therefore,
synthetic MasterPrints at the feature-level. In this work they can be used by an adversary to launch a dictionary attack
we generate complete image-level MasterPrints known as against a specific subject that can compromise the security of
DeepMasterPrints, whose attack accuracy is found to be a fingerprint-based recognition system. This means, it is pos-
much superior than that of previous methods. The proposed sible to “spoof” the fingerprints of a subject without actually
method, referred to as Latent Variable Evolution, is based gaining any information about the subject’s fingerprint.
on training a Generative Adversarial Network on a set of Roy et al. [25] demonstrated that MasterPrints can either
real fingerprint images. Stochastic search in the form of the be obtained from real fingerprint images or can be synthe-
Covariance Matrix Adaptation Evolution Strategy is then sized using a hill-climbing procedure. The synthetic Master-
used to search for latent input variables to the generator Prints were generated at the “template level” by modifying
network that can maximize the number of impostor matches the minutiae points in a fingerprint template [25, 24]. The
as assessed by a fingerprint recognizer. Experiments convey methods in [25, 24] did not generate images. However, to
the efficacy of the proposed method in generating DeepMas- launch a spoof-attack in practice, it is necessary to construct
terPrints. The underlying method is likely to have broad MasterPrints at the “image level” which can then be trans-
applications in fingerprint security as well as fingerprint ferred to a physical artifact. This observation motivated us
synthesis. to find a method for generating DeepMasterPrints - images
that are visually similar to natural fingerprint images.
To design DeepMasterPrints, there needs to be a way to
1. Introduction feasibly search the space of fingerprint images. Since not
all fingerprint systems use minutiae [20, 21], it is advanta-
Fingerprints are increasingly being used to verify the geous if minutiae information is not explicitly used during
identity of an individual in a variety of applications ranging the design process (unlike [25, 24]). Now neural networks
from unlocking doors to securing smartphones to authorizing can be used to generate synthetic fingerprint images. In
payments. In some applications such as smartphones, the particular, Generative Adversarial Networks (GANs) have
fingerprint sensor is small in size for ergonomic reasons [10] shown great promise in generating images that reproduce
and, therefore, these sensors obtain only partial images of a a particular style or domain [5, 8, 7]. However, their stan-
∗ This work was supported by the United States National Science Foun- dard design is not controllable. In other words, they do
dation under Grant 1618750 and Grant 1617466. This project also benefited not allow the generator to target additional constraints and
from GPUs donated by NVIDIA. objectives beyond reproducing the style of the training data.

978-1-5386-7180-1/18/$31.00 2018
c IEEE
For a DeepMasterPrint, we need to create a synthetic finger- multiple readings from the same finger during enrollment.
print image that can fool a fingerprint matcher. The matcher When a partial fingerprint is presented to the system during
should not only realize that the image is a fingerprint (visual verification, it is compared against all the partial enrolled
realism), but should also match that fingerprint image to prints corresponding to the subject. If a subject has n fin-
many different identities. Therefore, a generator network gers in the system and there are k partial prints saved per
has to be combined with a method of searching for Deep- fingerprint, then there are n × k opportunities for a match
MasterPrints. and the input image only needs to match one of them to be
In this paper, we present a method for creating Deep- declared a success. Such a setup is common on consumer
MasterPrints. This technique uses a neural network to learn mobile devices hosting small fingerprint sensors.
to generate images of fingerprints. It then uses evolution- Roy et al. [25] showed that MasterPrints could be ex-
ary optimization to search the latent variable space of the tracted from real fingerprints or could be synthetically gen-
neural network for a DeepMasterPrint. The Covariance Ma- erated. In the latter case, the authors generated synthetic
trix Adaptation Evolution Strategy (CMA-ES) is used to minutiae templates. Minutiae points in a fingerprint corre-
search the input space of the trained neural network for the spond to ridge endings and ridge bifurcations. Each minutia
ideal fingerprint image. This unique combination of evolu- point is represented as a 3-tupled value, (x, y, θ), where (x, y)
tionary optimization and generative neural networks allows denotes the location of the minutia and θ denotes the local
the neural network to constrain the search space while the orientation of the ridge on which the minutia is located. The
evolutionary algorithm handles the discrete fitness function. authors used a hill-climbing algorithm to iteratively modify
This is the first work that creates a synthetic Masterprint and synthesize a minutiae template that could be employed
at the image-level thereby further reinforcing the danger as a MasterPrint. The objective function for the hill-climbing
of utilizing small-sized sensors with limited resolution in procedure was the number of distinct fingerprint templates
fingerprint applications. This work directly shows how to in a training database that were successfully matched with
execute this exploit and is able to spoof 23% of the subjects the synthetic template. Their approach, however, has two
in the dataset at a 0.1% false match rate. At a 1% false match distinct disadvantages: Firstly, it does not generate an image.
rate, the generated DeepMasterPrints can spoof 77% of the Although one could potentially reconstruct an image from
subjects in the dataset. the template [22], these images have a very synthetic look
and could likely be detected. Secondly, their approach is
2. Background applicable primarily to minutiae-based matchers. Matchers
that utilize other information (e.g., local ridge frequency
2.1. Dictionary attack using synthetic MasterPrints and orientation) may not be vulnerable to such synthetic
minutiae templates.
Research in assessing vulnerabilities in a fingerprint
In this work, we directly generate images instead of minu-
recognition system is a constant arms race between fixing
tiae templates. One advantage of generating images instead
vulnerabilities and discovering new ones [19]. It is impor-
of templates, is that it is theoretically possible to design
tant for researchers to probe for new vulnerabilities so that
DeepMasterPrints for any fingerprint system that accepts
loopholes can be fixed [17]. Sometimes it is not just neces-
images [1]. Further, the attack can potentially be launched at
sary to prove that a vulnerability exists, but to show how an
the sensor level by transferring the images to a spoof artifact.
attack can actually be executed [6]. This has two important
consequences for researchers designing secure systems: (a)
2.2. Image generation
it allows them to evaluate the immediate risk of this threat,
and (b) it gives them a concrete attack vector to protect Recently, there have been rapid advancements in synthetic
against. Research around the vulnerability to MasterPrints is image generation by way of neural networks. Some of the
important for these reasons. most popular methods for image generation are Fully Visible
As stated earlier, a MasterPrint is a real or synthesized fin- Belief Networks (FVBN), Variational Autoencoders (VAE),
gerprint that can be used to impersonate multiple identities. and Generative Adversarial Networks (GAN) [7]. FVBNs
This type of attack does not require knowledge of a specific such as PixelRNN produce one pixel at a time, similar to text
individual’s fingerprint sample; instead, the attack can be generation, but can often be noisy in their output. VAEs, on
launched against anonymous subjects with some probability the other hand, tend to produce very smooth outputs. Current
of success [27]. The attack itself exploits the vulnerability GAN methods are perceived to produce results with fewer
of small fingerprint sensors that only image a portion of the artifacts than FVBNs and sharper images than VAEs [7]. In
fingerprint. Such sensors may not scan the entire fingerprint the end, any of these methods could be used in this work as
and, therefore, only partial prints are available. Since it long as they generate good quality fingerprint images.
would be impractical to require the user to place their finger GANs learn to generate images in an unsupervised fash-
the exact same way every time, these systems normally take ion. There are two parts to a GAN: a generator and a dis-
criminator. The generator is typically a neural network that the evaluation mechanism is a black box and only the final
inputs random noise and outputs an image. The discrimina- evaluation of each sample is available.
tor is also typically a neural network, which inputs an image The Covariance Matrix Adaption Evolutionary Strategy
and classifies it as being ‘real’ or ‘generated’. To ensure (CMA-ES) is a robust approach that has been shown to
that the generator produces images within the domain of the work on non-linear and non-convex fitness domains [12].
sample images, training happens in three steps: (a) Provide CMA-ES samples its population from a multivariate normal
real images to the discriminator. Train the discriminator distribution. Since each solution is represented as a combi-
to classify them as real. (b) Provide generated images to nation of variables, CMA-ES maintains a covariance matrix
the discriminator. Train the generator to classify them as that tracks how each variable affects fitness. In each gen-
generated. (c) Provide the generator with the discriminator’s eration, it creates a new sample based on the information
gradients. Train the generator to produce images that are in the covariance matrix. If variables A and B are shown
classified as real. to be highly correlated in solutions with a high fitness, then
This process is repeated until the network converges on it’s highly likely that the new sampled members will have
an approximation of the distribution of the real data. A and B correlated. This matrix is updated based on the
A major difficulty during training is keeping the two net- fitness of the new sample allowing the algorithm to learn the
works balanced so one does not become significantly better distribution of successful samples. The model it learns is an
than the other. Much work, since the invention of GANs, approximation of a second-order model of the fitness func-
has focused on stabilizing the training process; two popular tion [12]. This makes CMA-ES a powerful strategy when
approaches are the Wasserstein GAN (WGAN) and WGAN optimizing for difficult real-valued domains.
with gradient penalty [2, 9]. In standard GAN training, the Evolutionary methods have been used with neural net-
discriminator classifies the input as being either ‘real’ or works for a long time. This has primarily occurred through
‘generated’. The difference between the real data distribution neuroevolution, where evolution is used to evolve the
and the generated data distribution is then measured using weights and, sometimes, the topology of a neural network
the Jensen-Shannon divergence (JS) metric [2]. This metric [29]. Recently, researchers have shown that neuroevolution
does not provide a gradient everywhere for the generator can be used on deep neural networks and can even com-
and, therefore, requires the discriminator and generator to pete against reinforcement learning algorithms [26, 15]. Our
be closely matched. This, in turn, makes training unstable. work does not involve evolving the weights of the neural net-
WGAN, instead, uses an approximation of the Wasserstein works. Instead, in our work, the neural networks are trained
distance function to measure the difference between the real separately using the gradient descent algorithm, but evolu-
and generated distributions [2]. Since it is differentiable ev- tion is applied to the network inputs. A similar approach has
erywhere, it provides meaningful gradients for the generator. recently been proposed for an interactive evolution system
The two networks do not have to be well balanced and so the [4]; the difference there is that human aesthetic preference is
discriminator can be better trained preventing mode collapse. used as the fitness function.
While we had success with WGAN in this work, in prin-
ciple, any GAN algorithm could have been used. A recent 3. Proposed Methods
study tested a number of GAN algorithms and found that
The ideal system for generating a DeepMasterPrint would
with enough parameter tuning there was not a significant
be able to (a) generate every possible image, (b) test each im-
difference between them [16]. If larger images are needed,
age on all fingerprint matchers in existence, and (c) choose
a recent work shows that progressively growing GANs pro-
the image that successfully matches against the most num-
duces good results [14].
ber of distinct fingerprints pertaining to a large number of
identities. Since it is infeasible to have access to every fin-
2.3. Evolutionary Optimization
gerprint matcher, it is necessary to derive a DeepMasterPrint
Optimization via evolutionary strategies has been used in based on a sample of identities and matchers, and have it
AI for a long time. Evolutionary computation is a family of generalize. Limiting the images to just images of finger-
versatile optimization techniques that only need a method prints helps in generalization. Our scaled back ideal system
for representing and comparing solutions to find an optimal is able to generate any fingerprint image and search over a
solution. The basic algorithm starts with a random sample of sample of identities and matchers to find an ideal solution.
solutions, or members, from a population of all represented This approach not only generates an image, but it also has
solutions. The algorithm then evaluates the sample and ranks the potential to find a more effective solution than previous
each member. The best members are then varied to get a approaches. To implement this approach, we developed a
new sample of potentially superior solutions. This process new technique called Latent Variable Evolution.
is repeated until convergence or some other constraint is There are two parts to Latent Variable Evolution (LVE);
met. Evolution is particularly suited to instances where (1) train a neural network to generate images of fingerprints,
1. Upsample x 2 128 x 128 x 3 3.2. Searching the Space of Latent Variables
2. Convolution
3. Tanh 64 x 64 x 128

1. Upsample x 2
Algorithm 1 Latent Variable Evolution
32 x 32 x 256
2. Convolution f mr ← 1%, .1%, .01% and f ingerprint ← 12 partial
Kernel: 3
Stride: 1 16 x 16 x 1: Gθ ← trainGAN(data)
Padding: 1 512
3. Batch Norm
2: function MatchingScore(X)
4. Relu 3: img ← Gθ (X)
8x8
x 4: score ← 0
1024 5: for f ingerprint in data do
4x4
6: for partial in f ingerprint do
1. Dense x 7: if matching(img, partial, f mr) then
1024
2. Batch Norm 8: score + +
3. Relu
9: break
100 values x ~ 𝒩(0,1)
10: end if
11: end for
Figure 1: Generator Network Architecture. The discrimina-
12: end for
tor is the inverse of this model with subsampling instead of
13: return score
upsampling and LeakyReLu activation functions.
14: end function
15: M asterP rint ← CMAES(MatchingScore)
and (2) search over the latent variables of the network (the
input vector to the generator network) for a fingerprint that To create a DeepMasterPrint, we must evolve the latent
results in the best DeepMasterPrint, i.e., a fingerprint image variables of the generator to their optimal values. The in-
that matches with a large number of other fingerprint images. puts to a generator are called latent variables because their
To train an image generator, we use the WGAN method effect on the network output is only understood through the
described earlier and then use CMA-ES to evolve the fin- observed image. Since our network takes a hundred latent
gerprint. The method is tested on two different fingerprint variables as input, the optimal solution is a point in a hundred
datasets and with several different matchers. dimensional space. As shown in Figure 2, LVE samples a
number of these points, converts them to images, and then
3.1. Fingerprint Generator scores the images to learn the distribution over time of the
best points. These optimal points are the genotypes of the
In this work we train two generator networks, both us- DeepMasterPrints which can then be mapped to images.
ing the WGAN algorithm. The networks are modeled after LVE could use any evolutionary algorithm (or other
deep convolutional GAN and defined in Figure1 [18]. One stochastic global optimizers, such as Particle Swarm Op-
network is trained on a dataset of fingerprints scanned with timization) to search the latent space. An evolutionary al-
a capacitive sensor, and the other on a dataset of inked and gorithm does not require gradients and, therefore, is ideal
rolled fingerprints. The networks are trained adversarially for black-box optimization. In this domain, the matcher can
with a Wasserstein loss function and RMSProp with a learn- report how many identities (distinct fingerprints) match and
ing rate of 0.00005 [2]. The generators are trained using how good each match is, but it does not provide any infor-
the minibatch gradient descent scheme. Each batch samples mation about how it arrived at these results. There are no
64 images and 64 latent variable vectors. We trained each gradients that inform us which pixel of a DeepMasterPrint is
generator for 120,000 updates, with the discriminator being most or least effective. Since the fitness score for LVE is the
trained 5 times between each generator update. Using de- number of identity matches, the fitness landscape is also dis-
convolutions for the generator resulted in blocky artifacts continuous. Due to the hierarchical nature of convolutional
therefore we switched to upsampling with convolutions. networks, the latent variables are also not independently
It should be noted that there has been some research separable. For these reasons, it is important to use an evolu-
conducted into analyzing how much of the data distribution tionary technique that works well on rugged fitness domains,
a GAN actually learns [3]. Arora and Zhang tested a few such as CMA-ES [12]. Since CMA-ES learns a covariance
GAN architectures for diversity, and none of the GANs that matrix of the latent variables, it can also intelligently mu-
they tested were able to model the entire data distribution tate the correlated variables. In this work, we use Hansens
well. In the light of this, we acknowledge that WGAN will Python implementation of CMA-ES [11]. To evolve each
only model part of the image distribution and our technique fingerprint, we let the algorithm run for 3 days.
will not be able to produce every type of fingerprint. As detailed in Algorithm 1, the fitness score is the sum
Sample from Input Latent Variables
Distribution

Trained
Generator
Evaluate

Latent
Variable
Fitness
Function

Score

Output Image Check


for Matches
Update Model
of Distribution

*Size based on score

CMA-ES Optimization Latent Variable Fitness Function

Figure 2: Latent Variable Evolution with a trained network. On the left is a high level overview of CMA-ES and the box on
the right shows how the latent variables are evaluated.

total of identity matches. Each identity is represented by 0.1%, and 0.01%. The FMR is the probability that an im-
12 partial fingerprints. To be verified, only one of the 12 postor (i.e., non-mate) fingerprint pair will be incorrectly
partial fingerprint templates has to match with the input fin- marked as a match. If the FMR is set too high, the system
gerprint. This is the fundamental weakness that MasterPrints is not very secure. If it is too low, it will reject too many
and DeepMasterPrins are exploiting. The fitness of a latent genuine fingerprint pairs (i.e., mates).
variable involves converting each set of latent variables to an To verify that our DeepMasterPrints generalize well, we
image, checking images against all the partial prints in the split the capacitive dataset in half resulting in a test set and
system, and then summing up the unique identities that have a training set (images in the two sets do not have any sub-
at least one match. ject overlap). The test set is used for scoring the candidate
For our work, we use several different fingerprint match- DeepMasterPrints during optimization. The attack should
ers. We use the widely popular commercial fingerprint sys- be successful against these fingerprints as it is directly op-
tem, VeriFinger 9.0 SDK. This system is used in the fitness timized for them. We test the generators on the test set to
function in Algorithm 1. To be able to test how well the show how well the attack generalizes.
optimization for one system transfers to another, we also use
To test the effectiveness of a DeepMasterPrint attack in
the Bozorth3 matcher and the Innovatrics IDKit 5.3 SDK.
the case where one does not have access to the target matcher,
Bozorth3 is provided as an open source by NIST as part of
we test our DeepMasterPrints on two additional matchers,
their NIST Biometric Image Software (NBIS) suite. Both
viz., Bozorth3 and Innovatrics. The images are neither op-
VeriFinger and Innovatrics systems can be licensed from
timized for these matchers nor the identities in the test set.
their websites.
Both matchers are kept as close to their default state as possi-
3.3. Experimental Setup ble, the main parameter being the FMR. In this test scenario,
the DeepMasterPrint is compared against all the identities in
Smartphones are the primary focus of a DeepMasterPrint the test dataset to determine the number of matches.
attack due to their small sensors. Since smartphone systems
currently use capacitive sensors, we evolve our DeepMaster-
Prints from a capacitive dataset using the VeriFinger matcher. 4. Datasets
To stay consistent with previous work, we evolve DeepMas-
terPrints for three different security levels (characterized by We model two types of fingerprint images; those scanned
the False Match Rate - FMR); therefore, we get 6 DeepMas- from inked-and-rolled impressions and those obtained from
terPrints with the two generators. a capacitive sensor. Rolled fingerprints are produced by
In the work of Roy et al. [25], they used FMRs of 1%, applying ink to the finger and rolling the finger on paper.
4.1. Rolled images no minutiae points. This means that the generator is not only
producing images that look like fingerprints to humans, but
The rolled fingerprints come from the publicly avail-
they are algorithmically being identified as fingerprints too.
able NIST Special Database 9 fingerprint dataset [28]. The
dataset consists of all 10 fingerprints of 5400 unique sub-
jects. Each fingerprint is an 8-bit grayscale image. In our 5.2. DeepMasterPrints
work, the right thumbprint of each subject is selected. The The DeepMasterPrints created via LVE can be seen in
images are then preprocessed by removing the whitespace Figure 4. On the left are the DeepMasterPrints optimized for
and downscaling the resulting image to 256 × 256 pixels. the higher level of security (FMR=0.01%) and on the right
To obtain partial fingerprint samples, a random 128 × 128 are the ones for the lower level of security (FMR=1%). The
region is extracted every time an image is selected. results look very similar across different security settings but
4.2. Capacitive images not between datasets. The evolutionary algorithm is able to
generate more distorted images by sampling latent variables
The capacitive fingerprint images come from the Finger- far outside the distribution used to train the generator net-
Pass DB7 dataset [13]. This dataset has 12 partial finger- work. This is visually discernible in the DeepMasterPrints,
prints for each of 720 subjects. Each partial print is of size with the average latent value more than three standard de-
144 × 144 pixels at a resolution of 500 dpi. This is the same viations outside the original sampling distribution in some
dataset that was used by Roy et al. [25]. cases. This is not necessarily a problem, as the images are
still identified as fingerprints with around 20 minutiae points
5. Results identified per DeepMasterPrint.
5.1. Generated fingerprints In Table 1, the percentage of false subject matches are
displayed. The number of false subject matches is the num-
The results of training the WGAN generator can be seen ber of subjects in the dataset that successfully match against
in Figure 3. In the right column are the generated im- the DeepMasterPrint. The second row in the table shows the
ages, while the left column contains actual samples from the results of the VeriFinger matcher when used with test data.
datasets. The image generator seems to have captured the
basic structures in both instances.
Figure 3a shows partial fingerprints pertaining to the 5.2.1 Rolled DeepMasterPrints
rolled fingerprints from the NIST dataset. Looking at the
right batch, it is clear that the generator has learned the gen- The three rolled DeepMasterPrints make up the top of Figure
eral ridge structure of a fingerprint. Looking closer, there 4. At the lowest security level of 1% FMR, a single Deep-
are certain areas that look smudged. This is most likely due MasterPrint is able to match with 78% of the subjects in the
to the fact that the data is generated from random sections dataset. This is a large number of subjects, but it is unlikely
of the fingerprint and so the generator had a difficult time that any fingerprint system uses such an FMR value. At 0.1%
learning the global shape of a full fingerprint, though it does FMR, the DeepMasterPrint matches 8.61% of the dataset.
a good job in some cases. From visual inspection, it appears This represents a much more realistic security option and
to have learned the texture of fingerprints. results in a much higher number of (impostor) matches than
Figure 3b displays the results for the capacitive finger- what the FMR would lead one to expect. At the highest
prints. The results look better for this dataset. There are security level (FMR 0.01%), the attack results are not very
fewer smudges on the images and the ridges are better con- good, but this is an unlikely security level as it would be
nected. Looking at larger batches, the generated capacitive inconvenient to genuine users.
images are consistently better than the rolled images.
To evaluate the images as fingerprints, we extracted the
minutiae points from the image using a fingerprint matcher. 5.2.2 Capacitive DeepMasterPrints
The randomly generated images were determined to have
similar number of minutiae points as real images in the The three capacitive DeepMasterPrints make up the bottom
dataset. Something interesting we noticed is that the gener- row of Figure 4. Since all the match rates are for capaci-
ated images on average had double the False Match Rate as tive data, the capacitive DeepMasterPrints are much more
the real data. This means that even without evolution, the visually similar to the subject data than the rolled DeepMas-
fingerprints are already twice as good at spoofing a system terPrints. This should allow the capacitive DeepMasterPrints
than a random real fingerprint. This suggests that the gener- to do better than the rolled DeepMasterPrints. Looking at
ated images display common features more often than the Table 1, the results are, as a whole, a little better than the
real data distribution. As a sanity check, we provide images rolled DeepMasterPrints. At the 0.01% FMR level, the attack
of randomly generated noise to the matchers and they found results are much better.
(a) Real (left) and generated (right) samples for the NIST dataset.

(b) Real (left) and generated (right) samples for the FingerPass capacitive dataset.

Figure 3

Table 1: Successful matches on the capacitive dataset. The DeepMasterPrints in Figure 4 are optimized for VeriFinger, at three
security levels, on a capacitive training dataset. The effectiveness of each DeepMasterPrint can be seen on the test dataset.

Rolled DeepMasterPrint Matches Capacitive DeepMasterPrint Matches


0.01% FMR 0.1% FMR 1% FMR 0.01% FMR 0.1% FMR 1% FMR
VeriFinger Training 5.00% 13.89% 67.50% 6.94% 29.44% 89.44%
VeriFinger Test 0.28% 8.61% 78.06% 1.11% 22.50% 76.67%

5.3. Generalization best. Therefore, the results reported are based on the two
DeepMasterPrints that were optimized for an FMR of 0.01%
To understand how effective this attack is, the DeepMas- and used against the two verification systems at all three
terPrints are tested on systems for which they have not been security settings.
optimized. As stated previously, the Bozorth3 and Inno- Bozorth3 is publicly available and free to use, but it is
vatrics matching systems are used for this purpose. The also an older matcher. Perhaps this explains why the Rolled
result of these tests are available in Table 2. Both verifica- DeepMasterPrint generalize so well to this matcher. The
tion systems use the same three FMRs used for VeriFinger. DeepMasterPrint actually does better with Bozorth3 than
In the case of VeriFinger, six different DeepMasterPrints with VeriFinger in this case. The capacitive fingerprint was
were used. This represents the case where the target system much less effective against this system but still successful
is known and can be accessed or replicated to launch a more overall. At all security levels, except at the highest one, the
highly optimized attack. In these cases, we found better DeepMasterPrint performs around 30 times better than an
performance by optimizing for each security level. This average fingerprint. At 0.01% FMR there are no matches;
strategy did not prove very effective for the case where the this makes it difficult to accurately determine the DeepMas-
test environment is unknown. It was found that evolving terPrint performance at this level.
DeepMasterPrints at high security settings generalized the Innovatrics is a more recent matcher still under active
5.4. Comparative Results
In our work, we created a DeepMasterPrint that is in-
tended to spoof an arbitrary identity in a single try. Previous
work had much worse results when given only a single at-
tempt. Besides providing an image, LVE creates a much
more effective MasterPrint. Table 3 has the results of the
minutiae-only approaches and the capacitive DeepMaster-
Print image [23]. In the previous work by Roy et al. [25], the
authors generated a suite of five fingerprint templates that
were used sequentially to launch an attack, assuming five
attempts. Our results for a single DeepMasterPrint is compa-
rable to this suite of multiple MasterPrints. We expect LVE
to do very well in creating sequential DeepMasterPrints.
Figure 4: Evolved DeepMasterPrints for rolled fingerprints
(top) and for capacitive fingerprints (bottom). Left to right, Table 3: Percentage of subjects matched using the Deep-
each fingerprint is optimized for an FMR of 0.01%, 0.1%, MasterPrint compared to the previous method for generating
and 1%, respectively. MasterPrints. The results are on the capacitive dataset and
uses the VeriFinger matcher.

development. It would, therefore, be expected to be more 0.01% FMR 0.1% FMR 1% FMR
resilient to attacks using DeepMasterPrints. Surprisingly, Single MasterPrint 1.88% 6.60% 33.40%
the capacitive DeepMasterPrint is consistent here and gets MasterPrint Suite 6.88% 30.69% 77.92%
similar results to what it did on Bozorth3. One hypothesis Single DeepMasterPrint 1.11% 22.50% 76.67%
here is that the capacitive DeepMasterPrint has found some
universal patterns that are not specific to a particular veri-
fication system. The rolled DeepMasterPrint actually does
worse than the capacitive one in spite of performing so well 6. Conclusion
on Bozorth3. It is evident that these two matchers handle This paper presents Latent Variable Evolution as a method
rolled fingerprints very differently. The training data used for generating DeepMasterPrints: partial fingerprint images
to train the fingerprint generator definitely makes a differ- which can be used for launching dictionary attacks against
ence here. The DeepMasterPrints are roughly 10 times more a fingerprint verification system. The first step is to train a
effective than a random image. GAN using images from a fingerprint dataset. Then LVE
searches the latent variables of the generator network for
an image that maximizes the number of fingerprints which
Table 2: The DeepMasterPrints optimized for the highest
are successfully matched with it. The method proposed in
security levels were found to generalize the best. The two
this paper was found to (1) result in DeepMasterPrints that
DeepMasterPrints optimized for 1% FMR are tested on the
are more successful in matching against fingerprints pertain-
Bozorth3 and Innovatrics matchers. They are both tested at
ing to a large number of distinct identities, and (2) generate
three different security levels, with the percentage of suc-
complete images - as opposed to just minutiae templates -
cessful matches on the capacitive test set reported.
which can potentially be used to launch a practical DeepMas-
terPrint attack. Experiments with three different fingerprint
Verification System MasterPrint Matches matchers and two different datasets show that the method is
FMR Rolled Capacitive robust and not dependent on the artifacts of any particular
0.01% 0.00% 0.00% fingerprint matcher or dataset.
Bozorth3 0.1% 23.06% 2.78% Beyond the application of generating DeepMasterPrints,
1% 89.72% 31.39% this paper successfully shows the usefulness of searching
0.01% 0.00% 0.83% the latent space of a generator network for images, or other
Innovatrics 0.1% 0.83% 3.61% artifacts, that meet a given objective. This idea is surpris-
1% 10.56% 25.28% ingly under-explored and could be useful in computational
creativity research as well as other security domains. Initial
work on using a similar approach for aesthetic purposes in
an interactive setting can be found in [4].
References [16] M. Lui, K. Kurach, M. Michalski, S. Gelly, and O. Bousquet.
Are GANs created equal? a large-scale study. arXiv, 2017. 3
[1] Apple. iOS Security - White Paper, 2017. 2
[17] E. Marasco and A. Ross. A survey on anti-spoofing schemes
[2] M. Arjovsky, S. Chintala, and L. Bottou. Wasserstein GAN.
for fingerprint recognition systems. ACM Computing Surveys,
arXiv preprint arXiv:1701.07875, 2017. 3, 4
47(2):1–36, 2015. 2
[3] S. Arora and Y. Zhang. Do GANs actually learn the distribu-
[18] A. Radford, L. Metz, and S. Chintala. Unsupervised represen-
tion? an empirical study. arXiv preprint arXiv:1706.08224,
tation learning with deep convolutional generative adversarial
2017. 4
networks. arXiv preprint arXiv:1511.06434, 2015. 4
[4] P. Bontrager, W. Lin, J. Togelius, and S. Risi. Deep interactive
evolution. In International Conference on Evolutionary and [19] N. Ratha, J. Connell, and R. Bolle. Enhancing security and
Biologically Inspired Music and Art. Springer, 2018. 3, 8 privacy in biometrics-based authentication systems. IBM
[5] K. Cao and A. K. Jain. Fingerprint synthesis: Evaluating Systems Journal, 40(3):614–634, 2001. 2
[20] A. Ross, A. Jain, and J. Reisman. A hybrid fingerprint
fingerprint search at scale. In Proceedings of International
matcher. Pattern Recognition, 36(7):1661–1673, 2003. 1
Conference on Biometrics, pages 1–8, 2018. 1
[6] J. Galbally, R. Cappelli, A. Lumini, G. Gonzalez-de Rivera, [21] A. Ross, J. Reisman, and A. K. Jain. Fingerprint matching
D. Maltoni, J. Fierrez, J. Ortega-Garcia, and D. Maio. An using feature space correlation. In Proc. of International
evaluation of direct attacks using fake fingers generated from ECCV Workshop on Biometric Authentication, pages 48–57,
ISO templates. Pattern Recognition Letters, 31(8):725–732, 2004. 1
2010. 2 [22] A. Ross, J. Shah, and A. K. Jain. From Template to Image:
[7] I. Goodfellow. NIPS 2016 tutorial: Generative adversarial Reconstructing Fingerprints From Minutiae Points. IEEE
networks. arXiv preprint arXiv:1701.00160, 2016. 1, 2 Transactions on Pattern Analysis and Machine Intelligence,
[8] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde- 29(4):544–560, April 2007. 2
Farley, S. Ozair, A. Courville, and Y. Bengio. Generative [23] A. Roy. Personal communication, 2017. 8
adversarial nets. In Advances in Neural Information Process- [24] A. Roy, N. Memon, , J. Togelius, and A. Ross. Evolution-
ing Systems, pages 2672–2680, 2014. 1 ary methods for generating synthetic masterprint templates:
[9] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Dictionary attack in fingerprint recognition. In International
Courville. Improved training of wasserstein GANs. In Ad- Conference on Biometrics, pages 1–8, 2018. 1
vances in Neural Information Processing Systems, pages [25] A. Roy, N. Memon, and A. Ross. Masterprint: Exploring
5769–5779, 2017. 3 the vulnerability of partial fingerprint-based authentication
[10] B. B. Han, C. A. Marciniak, and W. C. Westerman. Fin- systems. IEEE Transactions on Information Forensics and
gerprint sensing and enrollment, 2014. US Patent App. Security, 2017. 1, 2, 5, 6, 8
14/244,143. 1 [26] F. P. Such, V. Madhavan, E. Conti, J. Lehman, K. O. Stanley,
[11] N. Hansen. The CMA Evolution Strategy: A Comparing and J. Clune. Deep neuroevolution: Genetic algorithms are
Review, pages 75–102. Springer, Berlin, Heidelberg, 2006. 4 a competitive alternative for training deep neural networks
[12] N. Hansen and A. Ostermeier. Completely derandomized self- for reinforcement learning. arXiv preprint arXiv:1712.06567,
adaptation in evolution strategies. Evolutionary computation, 2017. 3
9(2):159–195, 2001. 3, 4 [27] M. Une, A. Otsuka, and H. Imai. Wolf attack probability:
[13] X. Jia, X. Yang, Y. Zang, N. Zhang, and J. Tian. A cross- A new security measure in biometric authentication systems.
device matching fingerprint database from multi-type sen- In International Conference on Biometrics, pages 396–406.
sors. In 21st International Conference on Pattern Recognition Springer, 2007. 2
(ICPR), pages 3001–3004, 2012. 6 [28] C. I. Watson. NIST special database 9, mated fingerprint
[14] T. Karras, T. Aila, S. Laine, and J. Lehtinen. Progressive card pairs. National Institute of Standards and Technology,
growing of GANs for improved quality, stability, and varia- February 1993. 5
tion. arXiv preprint arXiv:1710.10196, 2017. 3 [29] X. Yao. Evolving artificial neural networks. Proceedings of
[15] J. Lehman, J. Chen, J. Clune, and K. O. Stanley. Safe muta- the IEEE, 87(9):1423–1447, 1999. 3
tions for deep and recurrent neural networks through output
gradients. arXiv preprint arXiv:1712.06563, 2017. 3

Das könnte Ihnen auch gefallen